CHFI: Computer Hacking Forensic Investigator

Course Details

Modules

Trainers

Reviews

WHAT YOU WILL LEARN

EC-Council releases the most advanced
Computer Forensic Investigation program in the world. CHFIv8 presents a
detailed methodological approach to computer forensics and evidence analysis.
It is a comprehensive course covering major forensic investigation scenarios
that enable students to acquire hands-on experience on various forensic
investigation techniques and standard tools necessary to successfully carry-out
a computer forensic investigation.

Battles between corporations, governments,
and countries are no longer fought using physical force. Cyber war has begun
and the consequences can be seen in every day life. With the onset of
sophisticated cyber-attacks, the need for advanced cyber security and
investigation training is a mandate in the present day. If you or your
organization requires the knowledge or skills to identify, track, and prosecute
the cybercriminals, then this is the course for you. This course helps students
to excel in digital evidence acquisition, handling and analysis in a
forensically sound manner. Acceptable in a court of law, these skills will lead
to successful prosecutions in various types of security incidents such as data
breaches, corporate espionage, insider threats and other intricate cases
involving computer systems.

AUDIENCE

The CHFI program is designed
for all IT professionals involved with information system security, computer
forensics, and incident response.

CERTIFICATION

The CHFI 312-49 exam will be conducted on
the last day of training. Students need to pass the online Prometric exam to
receive the CHFI certification.

METHODOLOGY

This program will be conducted with
interactive lectures, PowerPoint presentations, discussions and practical
exercises

COURSE OBJECTIVES

Upon completion of this program,
participants should be able to :

Identify, track, and
prosecute the cybercriminals

Excel in digital evidence acquisition, handling
and analysis in a forensically sound manner

Expand All

Modules

Computer Forensics In Today’s World

Forensics Science

Computer Forensics

Security Incident Report

Aspects of Organizational Security

Evolution of Computer Forensics

Objective of Computer Forensics

Need for Compute Forensics

Forensics Readiness

Benefits of Forensics Readiness

Goals of Forensics Readiness

Forensics Readiness Planning

Cyber Crime

Computer Facilitated Crimes

Modes of Attacks

Examples of Cyber Crime

Types of Computer Crimes

Cyber Criminals

Organized Cyber Crime: Organizational Chart

How Serious are Different Types of Incidents?

Disruptive Incidents to the Business

Cost Expenditure Responding to the Security Incident

Cyber Crime Investigation

Key Steps in Forensics Investigation

Rules of Forensics Investigation

Need for Forensics Investigator

Role of Forensics Investigator

Accessing Computer Forensics Resources

Role of Digital Evidence

Corporate Investigations

Understanding Corporate Investigations

Approach to Forensics Investigation: A Case Study

Instructions for the Forensic Investigator to Approach the Crime Scene